Skip main navigation

Cookies Notification

We use cookies on this site to enhance your user experience. By continuing to browse the site, you consent to the use of our cookies. Learn More
×

System Upgrade on Tue, May 28th, 2024 at 2am (EDT)

Existing users will be able to log into the site and access content. However, E-commerce and registration of new users may not be available for up to 12 hours.
For online purchase, please visit us again. Contact us at customercare@wspc.com for any enquiries.

SEARCH GUIDE  Download Search Tip PDF File

  Bestsellers

  • articleNo Access

    Research on Image Recognition Technology in the Encryption and Decryption Process of Electronic Archives Driven by Computer Vision

  • articleNo Access

    A new coding algorithm using Fibonacci numbers, linear mappings, and change of basis

  • articleNo Access

    Modified security and cryptography-based data deduplication in cloud environment

  • articleNo Access

    An ElGamal-like Secure Channel Free Public Key Encryption with Keyword Search Scheme

  • articleNo Access

    A Steganography Embedding Method Based on CDF-DWT Technique for Reversible Data Hiding Application Using Elgamal Algorithm

  • articleNo Access

    DESIGN OF CHAOTIC PSEUDO-RANDOM BIT GENERATOR AND ITS APPLICATIONS IN STREAM-CIPHER CRYPTOGRAPHY

  • articleNo Access

    A plain-text independent color image encryption system with multi-thread permutation and multi-channel diffusion

  • articleNo Access

    CELLULAR AUTOMATA ENCRYPTION: the reverse algorithm, Z-parameter and chain-rules

  • articleNo Access

    FUNCTIONAL SYNCHRONIZATION AND ITS APPLICATION TO SECURE COMMUNICATIONS

  • articleNo Access

    A NEW CHAOTIC ENCRYPTION ALGORITHM BASED ON THE ERGODICITY OF CHAOS

  • articleNo Access

    A MULTIPLE-PLAINTEXTS-ORIENTED CHAOTIC CRYPTOSYSTEM

  • articleNo Access

    A novel chaotic oscillator with a half-line of unstable equilibria: Basins of attraction, chaos control, chaos synchronization, and encryption applications

  • articleNo Access

    RGB-Based Secure Share Creation in Visual Cryptography Using Optimal Elliptic Curve Cryptography Technique

  • articleNo Access

    Xilinx Zynq FPGA for Hardware Implementation of a Chaos-Based Cryptosystem for Real-Time Image Protection

  • articleNo Access

    Design and FPGA Implementation of New Multidimensional Chaotic Map for Secure Communication

  • articleNo Access

    Enhancing Iris Authentication for Managing Multiple Cancellations: Leveraging Quotient Filters

  • articleNo Access

    PROBLEMS WITH A PROBABILISTIC ENCRYPTION SCHEME BASED ON CHAOTIC SYSTEMS

  • articleNo Access

    ONLINE SECURE CHATTING SYSTEM USING DISCRETE CHAOTIC MAP

  • articleNo Access

    A NOVEL SWITCHED CIRCUIT FOR CHAOTIC COMMUNICATION

  • articleNo Access

    STEPS TOWARDS CRYPTANALYSIS OF CHAOTIC ACTIVE/PASSIVE DECOMPOSITION ENCRYPTION SCHEMES USING AVERAGE DYNAMICS ESTIMATION